Several nods of agreement preceded a small voice coming from the far end of the table. "If you want to call it security." A small pre-adolescent spoke in a high pitched whine.
"What do you mean . . .I"m sorry, I don"t know what to call you,"
asked Scott.
"GWhiz. The security is a toy."
GWhiz spoke unpretentiously about how incredibly simple it is to crack any security system. He maintained that there are theoret- ical methods to crack into any, and he emphasized any, computer.
"It"s impossible to protect a computer 100%. Can"t be done. So that means that every computer is crackable." He offered to explain the math to Scott who politely feigned ignorance of decimal points. "In short, I, or anyone, can get into any computer they want. There is always a way."
"Isn"t that a scary thought?" Scott asked to no one in particu- lar.
Scott learned from the others that GWhiz was a 16 year old high school junior from Phoenix, Arizona. He measured on the high-end of the genius scale, joined Mensa at 4 and already had in hand scholarships from Westinghouse, Mellon, CalTech, MIT, Stanford to name a few. At the tender age of 7 he started programming and was now fluent in eleven computer languages. GWhiz was regarded with an intellectual awe from hackers for his theoretical a.n.a.ly- ses that he had turned into hacking tools. He was a walking encyclopedia of methods and techniques to both protect and attack computers. To GWhiz, straddling the political fence by arming both sides with the same weapons was a logical choice. Scott viewed it as a high tech MAD - Mutual a.s.sured Destruction, com- puter wise.
"Don"t you see," said the British DRDR, continuing as if there had been no interruption. "The media portrays us as security breaking phreaks, and that"s exactly what we are. And that works for the establishment as well. We keep the designers and securi- ty people honest by testing their systems for free. What a great deal, don"t you think? We, the hackers of the world, are the Good Housekeeping Seal of security systems by virtue of the fact that either we can or we cannot penetrate them. If that"s not working for the system, I don"t know what is."
"DRDR"s heading down the right path," Dave the futurist spoke up. "Even though he does work for GCHQ."
"GCHQ?" Scott asked quickly.
"The English version of your NSA," said Pinball, still engrossed in his food.
"I do not!" protested DRDR. "Besides, what difference would it make if I did?" He asked more defensively.
"None, none at all," agreed Dave. "The effect is the same.
However, if you are an MI-5 or MI-6 or whatever, that would show a great deal of unantic.i.p.ated foresight on the part of your government. I wish ours would think farther ahead than today"s headlines. I have found that people everywhere in the world see the problem as one of hackers, rather than the fundamental issues that are at stake. We hackers are manifestations of the problems that technology has bequeathed us. If any of our governments were actually responsive enough to listen, they would have a great deal of concern for the emerging infrastructure that doesn"t have a leader. Now, I"m not taking a side on this one, but I am saying that if I were the government, I would sure as all h.e.l.l want to know what was going on in the trenches. The U.S.
especially."
Everyone seemed to agree with that.
"But they"re too caught up in their own meaningless self-sustain- ing parasitic lives to realize that a new world is shaping around them." When Che2 spoke, he spoke his mind, leaving no doubt as to how he felt. "They don"t have the smarts to get involved and see it first hand. Which is fine by me, because, as you said,"
he said pointing at DRDR, "it doesn"t matter. They wouldn"t listen to him anyway. It gives us more time to build in de- fenses."
"Defenses against what?" asked Scott.
"Against them, of course," responded Che2. "The fascist military industrial establishment keeps us under a microscope. They"re scared of us. They have spent tens of billions of dollars to construct huge computers, built into the insides of mountains, protected from nuclear attack. In them are data bases about you, and me, and him and hundreds of millions of others. There are a lot of these systems, IRS, the Census Department has one, the FBI, the DIA, the CIA, the NSA, the OBM, I can go on." Che2"s voice crescendo"d and he got more demonstrative as the importance he attributed to each subject increased. "These computers con- tain the most private information about us all. I for one, want to prevent them from ever using that information against me or letting others get at it either. Unlike those who feel that the Bill of Rights should be re-interpreted and re-shaped and re- packaged to feed their power frenzy, I say it"s worked for 200 years and I don"t want to fix something if it ain"t broke."
"One needs to weigh the consequences of breaking and entering a computer, a.s.say the purpose, evaluate the goal against the possi- ble negatives before wildly embarking through a foreign computer.
That is what we mean by the Code." Solon spoke English with Teutonic precision and a mild lilt that gave his accented words additional credibility. He sounded like an expert. "I believe, quite strongly, that it is not so complicated to have a major portion of the hacker community live by the Code. Unless you are intent on damage, no one should have any trouble with the simple Credo, "leave things as you found them". You see, there is nothing wrong with breaking security as long as you"re accom- plishing something useful."
"Hold on," interrupted Scott. "Am I hearing this right? You"re saying that it"s all right to break into a computer as long as you don"t do any damage, and put everything right before you leave?"
"That"s about it. It is so simple, yet so blanketing in its ramifications. The beauty of the Code, if everyone lived by it, would be a maximization of computer resources. Now, that is good for everyone."
"Wait, I can"t stand this, wait," said Scott holding his hands over his head in surrender. He elicited a laugh from everyone but Che2. "That"s like saying, it"s O.K. for you to come into my house when I"m not there, use the house, wash the dishes, do the laundry, sweep up and split. I have a real problem with that.
That"s an invasion of my privacy and I would personally resent the s.h.i.t out of it." Scott tried this line of reasoning again as he had with Kirk.
"Just the point," said DRDR. "When someone breaks into a house it"s a civil case. But this new b.l.o.o.d.y Computer Misuse Act makes it a felony to enter a computer. Parliament isn"t 100% perfect,"
he added comically. DRDR referred to the recent British attempts at legislative guidelines to criminalize certain computer activi- ties.
"As you should resent it." Dave jumped in speaking to Scott.
"But there"s a higher purpose here. You resent your house being used by an uninvited guest in your absence. Right?" Scott a- greed. "Well, let"s say that you are going to Hawaii for a couple of weeks, and someone discovers that your house is going to be robbed while you"re gone. So instead of bothering you, he house sits. Your house doesn"t get robbed, you return, find nothing amiss, totally unaware of your visitor. Would you rather get robbed instead?"
"Well, I certainly don"t want to get robbed, but . . . I know what it is. I"m out of control and my privacy is still being violated. I don"t know if I have a quick answer." Scott looked and sounded perplexed.
"Goot! You should not have a quick answer, for that answer is the core, the essence of the ultimate problem that we all inves- tigate every day." Solon gestured to their table of seven. "That question is security versus freedom. Within the world of acade- mia there is a strong tendency to share everything. Your ideas, your thoughts, your successes and failures, the germs of an idea thrown away and the migration of a brainstorm into the tangible.
They therefore desire complete freedom of information exchange, they do not wish any restrictions on their freedom to interact.
However, the Governments of the world want to isolate and re- strict access to information; right or wrong, we acknowledge their concern. That is the other side, security with minimal freedom. The banks also prefer security to freedom, although they do it very poorly and give it a lot, how do you say, a lot of lip service?"
Everyone agreed that describing a bank"s security as lip service was entirely too complimentary, but for the sake of brevity they let it go uncontested.
"Then again, business hasn"t made up its mind as to whether they should bother protecting information a.s.sets or not. So, there are now four groups with different needs and desires which vary the ratio of freedom to security. In reality, of course, there will be hundreds of opinions," Solon added for accuracy"s sake.
"Mathematically, if there is no security, dividing by 0 results in infinite freedom. Any security at all and some freedom is curtailed. So, therein the problem to be solved. At what cost freedom? It is an age old question that every generation must ask, weigh and decide for itself. This generation will do the same for information and freedom. They are inseparable."
Scott soaked in the words and wanted to think about them later, at his leisure. The erudite positions taken by hackers was astonishing compared to what he had expected. Yes, some of the goals and convictions were radical to say the least, but the arguments were persuasive.
"Let me ask you," Scott said to the group. "What happens when computers are secure? What will you do then?"
"They won"t get secure," GWhiz said. "As soon as they come up with a defense, we will find a way around it."
"Won"t that cycle ever end?"
"Technology is in the hands of the people," commented Che2.
"This is the first time in history when the power is not concen- trated with a select few. The ancients kept the secrets of writing with their religious leaders; traveling by ship in the open sea was a hard learned and n.o.ble skill. Today, weapons of ma.s.s destruction are controlled by a few mad men who are no better than you or I. But now, computers, access to information, that power will never be taken away. Never!"
"It doesn"t matter." Dave was viewing the future in his own mind. "I doubt that computers will ever be secure, but instead, the barrier, the wall, the time and energy it takes to crack into them will become prohibitive for all but the most determined.
Anyway, there"ll be new technology to explore."
"Like what?" Asked Scott.
"Satellites are pretty interesting. They are a natural extension of the computer network, and cracking them will be lots easier in a couple of years." DRDR saw understanding any new technology as apersonal challenge.
"How do you crack a satellite? What"s there to crack?"
"How about beaming your own broadcasts to millions of people using someone else"s satellite?" DRDR speculated. "It"s been done before, and as the equipment gets cheaper, I can a.s.sure you that we"ll be seeing many more political statements illegally being made over the public airwaves. The BBC and NBC will have their hands full. In the near future, I see virtual realities as an ideal milieu for next generation hackers."
"I agree," said Solon. "And with virtual realities, the ethical issues are even more profound than with the Global Network."
Scott held up his hands. "I know what _I_ think it is, but before you go on, I need to know how you define a virtual reali- ty." The hackers looked at each until Dave took the ball.
"A virtual reality is fooling the mind and body into believing something is real that isn"t real." Scott"s face was blank.
"Ever been to Disneyland?" Dave asked. Scott nodded. "And you"ve ridden Star Tours?" Scott nodded again. "Well, that"s a simple virtual reality. Star Tours fools your body into thinking that you are in a s.p.a.ce ship careening through an asteroid belt, but in reality, you are suspended on a few guy wires. The projected image reinforces the sensory hallucination."
"Now imagine a visual field, currently it"s done with goggles, that creates real life pictures, in real time and interacts with your movements."
Scott"s light bulb went off. "That"s like the Holo-Deck on Star Trek!"
"That is the ultimate in virtual reality, yes. But before we can achieve that, imagine sitting in a virtual c.o.c.kpit of a virtual car, and seeing exactly what you would see from a race car at the Indy 500. The crowds, the noises, and just as importantly, the feel of the car you are driving. As you drive, you shift and the car reacts, you feel the car react. You actually follow the track in the path that you steer. The combination of sight, sound and hearing, even smell, creates a total illusion. In short, there is no way to distinguish between reality and delu- sion."